You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 

1191 lines
34 KiB

/*
* Copyright (c) 2013 Lukasz Marek <lukasz.m.luki@gmail.com>
*
* This file is part of FFmpeg.
*
* FFmpeg is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* FFmpeg is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with FFmpeg; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*/
#include <string.h>
#include "libavutil/avstring.h"
#include "libavutil/internal.h"
#include "libavutil/parseutils.h"
#include "avformat.h"
#include "internal.h"
#include "url.h"
#include "urldecode.h"
#include "libavutil/opt.h"
#include "libavutil/bprint.h"
#define CONTROL_BUFFER_SIZE 1024
#define DIR_BUFFER_SIZE 4096
typedef enum {
UNKNOWN,
READY,
DOWNLOADING,
UPLOADING,
LISTING_DIR,
DISCONNECTED,
ENDOFFILE,
} FTPState;
typedef enum {
UNKNOWN_METHOD,
NLST,
MLSD
} FTPListingMethod;
typedef struct {
const AVClass *class;
URLContext *conn_control; /**< Control connection */
URLContext *conn_data; /**< Data connection, NULL when not connected */
uint8_t control_buffer[CONTROL_BUFFER_SIZE]; /**< Control connection buffer */
uint8_t *control_buf_ptr, *control_buf_end;
int server_data_port; /**< Data connection port opened by server, -1 on error. */
int server_control_port; /**< Control connection port, default is 21 */
char *hostname; /**< Server address. */
char *user; /**< Server user */
char *password; /**< Server user's password */
char *path; /**< Path to resource on server. */
int64_t filesize; /**< Size of file on server, -1 on error. */
int64_t position; /**< Current position, calculated. */
int rw_timeout; /**< Network timeout. */
const char *anonymous_password; /**< Password to be used for anonymous user. An email should be used. */
int write_seekable; /**< Control seekability, 0 = disable, 1 = enable. */
FTPState state; /**< State of data connection */
FTPListingMethod listing_method; /**< Called listing method */
char *features; /**< List of server's features represented as raw response */
char *dir_buffer;
size_t dir_buffer_size;
size_t dir_buffer_offset;
int utf8;
const char *option_user; /**< User to be used if none given in the URL */
const char *option_password; /**< Password to be used if none given in the URL */
} FTPContext;
#define OFFSET(x) offsetof(FTPContext, x)
#define D AV_OPT_FLAG_DECODING_PARAM
#define E AV_OPT_FLAG_ENCODING_PARAM
static const AVOption options[] = {
{"timeout", "set timeout of socket I/O operations", OFFSET(rw_timeout), AV_OPT_TYPE_INT, {.i64 = -1}, -1, INT_MAX, D|E },
{"ftp-write-seekable", "control seekability of connection during encoding", OFFSET(write_seekable), AV_OPT_TYPE_BOOL, {.i64 = 0}, 0, 1, E },
{"ftp-anonymous-password", "password for anonymous login. E-mail address should be used.", OFFSET(anonymous_password), AV_OPT_TYPE_STRING, { 0 }, 0, 0, D|E },
{"ftp-user", "user for FTP login. Overridden by whatever is in the URL.", OFFSET(option_user), AV_OPT_TYPE_STRING, { 0 }, 0, 0, D|E },
{"ftp-password", "password for FTP login. Overridden by whatever is in the URL.", OFFSET(option_password), AV_OPT_TYPE_STRING, { 0 }, 0, 0, D|E },
{NULL}
};
static const AVClass ftp_context_class = {
.class_name = "ftp",
.item_name = av_default_item_name,
.option = options,
.version = LIBAVUTIL_VERSION_INT,
};
static int ftp_close(URLContext *h);
static int ftp_getc(FTPContext *s)
{
int len;
if (s->control_buf_ptr >= s->control_buf_end) {
len = ffurl_read(s->conn_control, s->control_buffer, CONTROL_BUFFER_SIZE);
if (len < 0) {
return len;
} else if (!len) {
return -1;
} else {
s->control_buf_ptr = s->control_buffer;
s->control_buf_end = s->control_buffer + len;
}
}
return *s->control_buf_ptr++;
}
static int ftp_get_line(FTPContext *s, char *line, int line_size)
{
int ch;
char *q = line;
for (;;) {
ch = ftp_getc(s);
if (ch < 0) {
return ch;
}
if (ch == '\n') {
/* process line */
if (q > line && q[-1] == '\r')
q--;
*q = '\0';
return 0;
} else {
if ((q - line) < line_size - 1)
*q++ = ch;
}
}
}
/*
* This routine returns ftp server response code.
* Server may send more than one response for a certain command.
* First expected code is returned.
*/
static int ftp_status(FTPContext *s, char **line, const int response_codes[])
{
int err, i, dash = 0, result = 0, code_found = 0, linesize;
char buf[CONTROL_BUFFER_SIZE];
AVBPrint line_buffer;
if (line)
av_bprint_init(&line_buffer, 0, AV_BPRINT_SIZE_AUTOMATIC);
while (!code_found || dash) {
if ((err = ftp_get_line(s, buf, sizeof(buf))) < 0) {
if (line)
av_bprint_finalize(&line_buffer, NULL);
return err;
}
av_log(s, AV_LOG_DEBUG, "%s\n", buf);
linesize = strlen(buf);
err = 0;
if (linesize >= 3) {
for (i = 0; i < 3; ++i) {
if (buf[i] < '0' || buf[i] > '9') {
err = 0;
break;
}
err *= 10;
err += buf[i] - '0';
}
}
if (!code_found) {
if (err >= 500) {
code_found = 1;
result = err;
} else
for (i = 0; response_codes[i]; ++i) {
if (err == response_codes[i]) {
code_found = 1;
result = err;
break;
}
}
}
if (code_found) {
if (line)
av_bprintf(&line_buffer, "%s\r\n", buf);
if (linesize >= 4) {
if (!dash && buf[3] == '-')
dash = err;
else if (err == dash && buf[3] == ' ')
dash = 0;
}
}
}
if (line)
av_bprint_finalize(&line_buffer, line);
return result;
}
static int ftp_send_command(FTPContext *s, const char *command,
const int response_codes[], char **response)
{
int err;
ff_dlog(s, "%s", command);
if (response)
*response = NULL;
if (!s->conn_control)
return AVERROR(EIO);
if ((err = ffurl_write(s->conn_control, command, strlen(command))) < 0)
return err;
if (!err)
return -1;
/* return status */
if (response_codes) {
return ftp_status(s, response, response_codes);
}
return 0;
}
static void ftp_close_data_connection(FTPContext *s)
{
ffurl_closep(&s->conn_data);
s->state = DISCONNECTED;
}
static void ftp_close_both_connections(FTPContext *s)
{
ffurl_closep(&s->conn_control);
ftp_close_data_connection(s);
}
static int ftp_auth(FTPContext *s)
{
char buf[CONTROL_BUFFER_SIZE];
int err;
static const int user_codes[] = {331, 230, 0};
static const int pass_codes[] = {230, 0};
if (strpbrk(s->user, "\r\n"))
return AVERROR(EINVAL);
err = snprintf(buf, sizeof(buf), "USER %s\r\n", s->user);
if (err >= sizeof(buf))
return AVERROR(ENOSYS);
err = ftp_send_command(s, buf, user_codes, NULL);
if (err == 331) {
if (s->password) {
if (strpbrk(s->password, "\r\n"))
return AVERROR(EINVAL);
err = snprintf(buf, sizeof(buf), "PASS %s\r\n", s->password);
if (err >= sizeof(buf))
return AVERROR(ENOSYS);
err = ftp_send_command(s, buf, pass_codes, NULL);
} else
return AVERROR(EACCES);
}
if (err != 230)
return AVERROR(EACCES);
return 0;
}
static int ftp_passive_mode_epsv(FTPContext *s)
{
char *res = NULL, *start = NULL, *end = NULL;
int i;
static const char d = '|';
static const char *command = "EPSV\r\n";
static const int epsv_codes[] = {229, 0};
if (ftp_send_command(s, command, epsv_codes, &res) != 229 || !res)
goto fail;
for (i = 0; res[i]; ++i) {
if (res[i] == '(') {
start = res + i + 1;
} else if (res[i] == ')') {
end = res + i;
break;
}
}
if (!start || !end)
goto fail;
*end = '\0';
if (strlen(start) < 5)
goto fail;
if (start[0] != d || start[1] != d || start[2] != d || end[-1] != d)
goto fail;
start += 3;
end[-1] = '\0';
s->server_data_port = atoi(start);
ff_dlog(s, "Server data port: %d\n", s->server_data_port);
av_free(res);
return 0;
fail:
av_free(res);
s->server_data_port = -1;
return AVERROR(ENOSYS);
}
static int ftp_passive_mode(FTPContext *s)
{
char *res = NULL, *start = NULL, *end = NULL;
int i;
static const char *command = "PASV\r\n";
static const int pasv_codes[] = {227, 0};
if (ftp_send_command(s, command, pasv_codes, &res) != 227 || !res)
goto fail;
for (i = 0; res[i]; ++i) {
if (res[i] == '(') {
start = res + i + 1;
} else if (res[i] == ')') {
end = res + i;
break;
}
}
if (!start || !end)
goto fail;
*end = '\0';
/* skip ip */
if (!av_strtok(start, ",", &end)) goto fail;
if (!av_strtok(NULL, ",", &end)) goto fail;
if (!av_strtok(NULL, ",", &end)) goto fail;
if (!av_strtok(NULL, ",", &end)) goto fail;
/* parse port number */
start = av_strtok(NULL, ",", &end);
if (!start) goto fail;
s->server_data_port = atoi(start) * 256;
start = av_strtok(NULL, ",", &end);
if (!start) goto fail;
s->server_data_port += atoi(start);
ff_dlog(s, "Server data port: %d\n", s->server_data_port);
av_free(res);
return 0;
fail:
av_free(res);
s->server_data_port = -1;
return AVERROR(EIO);
}
static int ftp_current_dir(FTPContext *s)
{
char *res = NULL, *start = NULL, *end = NULL;
int i;
static const char *command = "PWD\r\n";
static const int pwd_codes[] = {257, 0};
if (ftp_send_command(s, command, pwd_codes, &res) != 257 || !res)
goto fail;
for (i = 0; res[i]; ++i) {
if (res[i] == '"') {
if (!start) {
start = res + i + 1;
continue;
}
end = res + i;
break;
}
}
if (!end)
goto fail;
*end = '\0';
s->path = av_strdup(start);
av_free(res);
if (!s->path)
return AVERROR(ENOMEM);
return 0;
fail:
av_free(res);
return AVERROR(EIO);
}
static int ftp_file_size(FTPContext *s)
{
char command[CONTROL_BUFFER_SIZE];
char *res = NULL;
int ret;
static const int size_codes[] = {213, 0};
ret = snprintf(command, sizeof(command), "SIZE %s\r\n", s->path);
if (ret >= sizeof(command))
return AVERROR(ENOSYS);
if (ftp_send_command(s, command, size_codes, &res) == 213 && res && strlen(res) > 4) {
s->filesize = strtoll(&res[4], NULL, 10);
} else {
s->filesize = -1;
av_free(res);
return AVERROR(EIO);
}
av_free(res);
return 0;
}
static int ftp_retrieve(FTPContext *s)
{
char command[CONTROL_BUFFER_SIZE];
static const int retr_codes[] = {150, 125, 0};
int resp_code, ret;
ret = snprintf(command, sizeof(command), "RETR %s\r\n", s->path);
if (ret >= sizeof(command))
return AVERROR(ENOSYS);
resp_code = ftp_send_command(s, command, retr_codes, NULL);
if (resp_code != 125 && resp_code != 150)
return AVERROR(EIO);
s->state = DOWNLOADING;
return 0;
}
static int ftp_store(FTPContext *s)
{
char command[CONTROL_BUFFER_SIZE];
static const int stor_codes[] = {150, 125, 0};
int resp_code, ret;
ret = snprintf(command, sizeof(command), "STOR %s\r\n", s->path);
if (ret >= sizeof(command))
return AVERROR(ENOSYS);
resp_code = ftp_send_command(s, command, stor_codes, NULL);
if (resp_code != 125 && resp_code != 150)
return AVERROR(EIO);
s->state = UPLOADING;
return 0;
}
static int ftp_type(FTPContext *s)
{
static const char *command = "TYPE I\r\n";
static const int type_codes[] = {200, 0};
if (ftp_send_command(s, command, type_codes, NULL) != 200)
return AVERROR(EIO);
return 0;
}
static int ftp_restart(FTPContext *s, int64_t pos)
{
char command[CONTROL_BUFFER_SIZE];
static const int rest_codes[] = {350, 0};
snprintf(command, sizeof(command), "REST %"PRId64"\r\n", pos);
if (ftp_send_command(s, command, rest_codes, NULL) != 350)
return AVERROR(EIO);
return 0;
}
static int ftp_set_dir(FTPContext *s)
{
static const int cwd_codes[] = {250, 550, 0}; /* 550 is incorrect code */
char command[MAX_URL_SIZE];
int ret;
ret = snprintf(command, sizeof(command), "CWD %s\r\n", s->path);
if (ret >= sizeof(command))
return AVERROR(ENOSYS);
if (ftp_send_command(s, command, cwd_codes, NULL) != 250)
return AVERROR(EIO);
return 0;
}
static int ftp_list_mlsd(FTPContext *s)
{
static const char *command = "MLSD\r\n";
static const int mlsd_codes[] = {150, 500, 0}; /* 500 is incorrect code */
if (ftp_send_command(s, command, mlsd_codes, NULL) != 150)
return AVERROR(ENOSYS);
s->listing_method = MLSD;
return 0;
}
static int ftp_list_nlst(FTPContext *s)
{
static const char *command = "NLST\r\n";
static const int nlst_codes[] = {226, 425, 426, 451, 450, 550, 0};
if (ftp_send_command(s, command, nlst_codes, NULL) != 226)
return AVERROR(ENOSYS);
s->listing_method = NLST;
return 0;
}
static int ftp_list(FTPContext *s)
{
int ret;
s->state = LISTING_DIR;
if ((ret = ftp_list_mlsd(s)) < 0)
ret = ftp_list_nlst(s);
return ret;
}
static int ftp_has_feature(FTPContext *s, const char *feature_name)
{
if (!s->features)
return 0;
return av_stristr(s->features, feature_name) != NULL;
}
static int ftp_features(FTPContext *s)
{
static const char *feat_command = "FEAT\r\n";
static const char *enable_utf8_command = "OPTS UTF8 ON\r\n";
static const int feat_codes[] = {211, 0};
static const int opts_codes[] = {200, 202, 451, 0};
av_freep(&s->features);
if (ftp_send_command(s, feat_command, feat_codes, &s->features) != 211) {
av_freep(&s->features);
}
if (ftp_has_feature(s, "UTF8")) {
int ret = ftp_send_command(s, enable_utf8_command, opts_codes, NULL);
if (ret == 200 || ret == 202)
s->utf8 = 1;
}
return 0;
}
static int ftp_connect_control_connection(URLContext *h)
{
char buf[CONTROL_BUFFER_SIZE], *response = NULL;
int err;
AVDictionary *opts = NULL;
FTPContext *s = h->priv_data;
static const int connect_codes[] = {220, 0};
if (!s->conn_control) {
ff_url_join(buf, sizeof(buf), "tcp", NULL,
s->hostname, s->server_control_port, NULL);
if (s->rw_timeout != -1) {
av_dict_set_int(&opts, "timeout", s->rw_timeout, 0);
} /* if option is not given, don't pass it and let tcp use its own default */
err = ffurl_open_whitelist(&s->conn_control, buf, AVIO_FLAG_READ_WRITE,
&h->interrupt_callback, &opts,
h->protocol_whitelist, h->protocol_blacklist, h);
av_dict_free(&opts);
if (err < 0) {
av_log(h, AV_LOG_ERROR, "Cannot open control connection\n");
return err;
}
/* check if server is ready */
if (ftp_status(s, ((h->flags & AVIO_FLAG_WRITE) ? &response : NULL), connect_codes) != 220) {
av_log(h, AV_LOG_ERROR, "FTP server not ready for new users\n");
return AVERROR(EACCES);
}
if ((h->flags & AVIO_FLAG_WRITE) && av_stristr(response, "pure-ftpd")) {
av_log(h, AV_LOG_WARNING, "Pure-FTPd server is used as an output protocol. It is known issue this implementation may produce incorrect content and it cannot be fixed at this moment.");
}
av_free(response);
if ((err = ftp_auth(s)) < 0) {
av_log(h, AV_LOG_ERROR, "FTP authentication failed\n");
return err;
}
if ((err = ftp_type(s)) < 0) {
av_log(h, AV_LOG_ERROR, "Set content type failed\n");
return err;
}
ftp_features(s);
}
return 0;
}
static int ftp_connect_data_connection(URLContext *h)
{
int err;
char buf[CONTROL_BUFFER_SIZE];
AVDictionary *opts = NULL;
FTPContext *s = h->priv_data;
if (!s->conn_data) {
/* Enter passive mode */
if (ftp_passive_mode_epsv(s) < 0) {
/* Use PASV as fallback */
if ((err = ftp_passive_mode(s)) < 0)
return err;
}
/* Open data connection */
ff_url_join(buf, sizeof(buf), "tcp", NULL, s->hostname, s->server_data_port, NULL);
if (s->rw_timeout != -1) {
av_dict_set_int(&opts, "timeout", s->rw_timeout, 0);
} /* if option is not given, don't pass it and let tcp use its own default */
err = ffurl_open_whitelist(&s->conn_data, buf, h->flags,
&h->interrupt_callback, &opts,
h->protocol_whitelist, h->protocol_blacklist, h);
av_dict_free(&opts);
if (err < 0)
return err;
if (s->position)
if ((err = ftp_restart(s, s->position)) < 0)
return err;
}
s->state = READY;
return 0;
}
static int ftp_abort(URLContext *h)
{
static const char *command = "ABOR\r\n";
int err;
static const int abor_codes[] = {225, 226, 0};
FTPContext *s = h->priv_data;
/* According to RCF 959:
"ABOR command tells the server to abort the previous FTP
service command and any associated transfer of data."
There are FTP server implementations that don't response
to any commands during data transfer in passive mode (including ABOR).
This implementation closes data connection by force.
*/
if (ftp_send_command(s, command, NULL, NULL) < 0) {
ftp_close_both_connections(s);
if ((err = ftp_connect_control_connection(h)) < 0) {
av_log(h, AV_LOG_ERROR, "Reconnect failed.\n");
return err;
}
} else {
ftp_close_data_connection(s);
if (ftp_status(s, NULL, abor_codes) < 225) {
/* wu-ftpd also closes control connection after data connection closing */
ffurl_closep(&s->conn_control);
if ((err = ftp_connect_control_connection(h)) < 0) {
av_log(h, AV_LOG_ERROR, "Reconnect failed.\n");
return err;
}
}
}
return 0;
}
static int ftp_connect(URLContext *h, const char *url)
{
char proto[10], path[MAX_URL_SIZE], credentials[MAX_URL_SIZE], hostname[MAX_URL_SIZE];
const char *tok_user = NULL, *tok_pass = NULL;
char *newpath = NULL;
int err;
FTPContext *s = h->priv_data;
s->state = DISCONNECTED;
s->listing_method = UNKNOWN_METHOD;
s->filesize = -1;
s->position = 0;
s->features = NULL;
av_url_split(proto, sizeof(proto),
credentials, sizeof(credentials),
hostname, sizeof(hostname),
&s->server_control_port,
path, sizeof(path),
url);
if (!*credentials) {
if (!s->option_user) {
tok_user = "anonymous";
tok_pass = av_x_if_null(s->anonymous_password, "nopassword");
} else {
tok_user = s->option_user;
tok_pass = s->option_password;
}
s->user = av_strdup(tok_user);
s->password = av_strdup(tok_pass);
} else {
char *pass = strchr(credentials, ':');
if (pass) {
*pass++ = '\0';
tok_pass = pass;
s->password = ff_urldecode(pass, 0);
} else {
tok_pass = s->option_password;
s->password = av_strdup(tok_pass);
}
s->user = ff_urldecode(credentials, 0);
}
s->hostname = av_strdup(hostname);
if (!s->hostname || !s->user || (tok_pass && !s->password)) {
return AVERROR(ENOMEM);
}
if (s->server_control_port < 0 || s->server_control_port > 65535)
s->server_control_port = 21;
if ((err = ftp_connect_control_connection(h)) < 0)
return err;
if ((err = ftp_current_dir(s)) < 0)
return err;
newpath = av_append_path_component(s->path, path);
if (!newpath)
return AVERROR(ENOMEM);
av_free(s->path);
s->path = newpath;
return 0;
}
static int ftp_open(URLContext *h, const char *url, int flags)
{
FTPContext *s = h->priv_data;
int err;
ff_dlog(h, "ftp protocol open\n");
if ((err = ftp_connect(h, url)) < 0)
goto fail;
if (ftp_restart(s, 0) < 0) {
h->is_streamed = 1;
} else {
ftp_file_size(s);
if (s->write_seekable != 1 && flags & AVIO_FLAG_WRITE)
h->is_streamed = 1;
}
return 0;
fail:
av_log(h, AV_LOG_ERROR, "FTP open failed\n");
ftp_close(h);
return err;
}
static int64_t ftp_seek(URLContext *h, int64_t pos, int whence)
{
FTPContext *s = h->priv_data;
int err;
int64_t new_pos;
ff_dlog(h, "ftp protocol seek %"PRId64" %d\n", pos, whence);
switch(whence) {
case AVSEEK_SIZE:
return s->filesize;
case SEEK_SET:
new_pos = pos;
break;
case SEEK_CUR:
new_pos = s->position + pos;
break;
case SEEK_END:
if (s->filesize < 0)
return AVERROR(EIO);
new_pos = s->filesize + pos;
break;
default:
return AVERROR(EINVAL);
}
if (h->is_streamed)
return AVERROR(EIO);
if (new_pos < 0) {
av_log(h, AV_LOG_ERROR, "Seeking to nagative position.\n");
return AVERROR(EINVAL);
}
if (new_pos != s->position) {
if ((err = ftp_abort(h)) < 0)
return err;
s->position = new_pos;
}
return new_pos;
}
static int ftp_read(URLContext *h, unsigned char *buf, int size)
{
FTPContext *s = h->priv_data;
int read, err, retry_done = 0;
ff_dlog(h, "ftp protocol read %d bytes\n", size);
retry:
if (s->state == ENDOFFILE)
return AVERROR_EOF;
if (s->state == DISCONNECTED) {
if ((err = ftp_connect_data_connection(h)) < 0)
return err;
}
if (s->state == READY) {
if ((err = ftp_retrieve(s)) < 0)
return err;
}
if (s->conn_data && s->state == DOWNLOADING) {
read = ffurl_read(s->conn_data, buf, size);
if (read >= 0) {
s->position += read;
s->filesize = FFMAX(s->filesize, s->position);
}
if (read == AVERROR_EOF) {
static const int retr_codes[] = {226, 250, 425, 426, 451, 0};
char *response = NULL;
err = ftp_status(s, &response, retr_codes);
if (err == 226) {
ftp_close_data_connection(s);
av_freep(&response);
s->state = ENDOFFILE;
return AVERROR_EOF;
}
/* 250 is not allowed, any other status means some kind of error */
av_log(h, AV_LOG_ERROR, "FTP transfer failed: %s\n", response ? response : (err < 0 ? av_err2str(err) : "?"));
av_freep(&response);
read = AVERROR(EIO);
}
if (read <= 0 && !h->is_streamed) {
/* Server closed connection. Probably due to inactivity */
av_log(h, AV_LOG_INFO, "Reconnect to FTP server.\n");
if ((err = ftp_abort(h)) < 0)
return err;
if (!retry_done) {
retry_done = 1;
goto retry;
}
}
return read;
}
av_log(h, AV_LOG_DEBUG, "FTP read failed\n");
return AVERROR(EIO);
}
static int ftp_write(URLContext *h, const unsigned char *buf, int size)
{
int err;
FTPContext *s = h->priv_data;
int written;
ff_dlog(h, "ftp protocol write %d bytes\n", size);
if (s->state == DISCONNECTED) {
if ((err = ftp_connect_data_connection(h)) < 0)
return err;
}
if (s->state == READY) {
if ((err = ftp_store(s)) < 0)
return err;
}
if (s->conn_data && s->state == UPLOADING) {
written = ffurl_write(s->conn_data, buf, size);
if (written > 0) {
s->position += written;
s->filesize = FFMAX(s->filesize, s->position);
}
return written;
}
av_log(h, AV_LOG_ERROR, "FTP write failed\n");
return AVERROR(EIO);
}
static int ftp_close(URLContext *h)
{
FTPContext *s = h->priv_data;
ff_dlog(h, "ftp protocol close\n");
ftp_close_both_connections(s);
av_freep(&s->user);
av_freep(&s->password);
av_freep(&s->hostname);
av_freep(&s->path);
av_freep(&s->features);
return 0;
}
static int ftp_get_file_handle(URLContext *h)
{
FTPContext *s = h->priv_data;
ff_dlog(h, "ftp protocol get_file_handle\n");
if (s->conn_data)
return ffurl_get_file_handle(s->conn_data);
return AVERROR(EIO);
}
static int ftp_shutdown(URLContext *h, int flags)
{
FTPContext *s = h->priv_data;
ff_dlog(h, "ftp protocol shutdown\n");
if (s->conn_data)
return ffurl_shutdown(s->conn_data, flags);
return AVERROR(EIO);
}
static int ftp_open_dir(URLContext *h)
{
FTPContext *s = h->priv_data;
int ret;
if ((ret = ftp_connect(h, h->filename)) < 0)
goto fail;
if ((ret = ftp_set_dir(s)) < 0)
goto fail;
if ((ret = ftp_connect_data_connection(h)) < 0)
goto fail;
if ((ret = ftp_list(s)) < 0)
goto fail;
s->dir_buffer = av_malloc(DIR_BUFFER_SIZE);
if (!s->dir_buffer) {
ret = AVERROR(ENOMEM);
goto fail;
}
s->dir_buffer[0] = 0;
if (s->conn_data && s->state == LISTING_DIR)
return 0;
fail:
ffurl_closep(&s->conn_control);
ffurl_closep(&s->conn_data);
return ret;
}
static int64_t ftp_parse_date(const char *date)
{
struct tm tv;
memset(&tv, 0, sizeof(struct tm));
av_small_strptime(date, "%Y%m%d%H%M%S", &tv);
return INT64_C(1000000) * av_timegm(&tv);
}
static int ftp_parse_entry_nlst(char *line, AVIODirEntry *next)
{
next->name = av_strdup(line);
return 0;
}
static int ftp_parse_entry_mlsd(char *mlsd, AVIODirEntry *next)
{
char *fact, *value;
char *saveptr = NULL, *p = mlsd;
ff_dlog(NULL, "%s\n", mlsd);
while(fact = av_strtok(p, ";", &saveptr)) {
p = NULL;
if (fact[0] == ' ') {
next->name = av_strdup(&fact[1]);
continue;
}
fact = av_strtok(fact, "=", &value);
if (!fact)
continue;
if (!av_strcasecmp(fact, "type")) {
if (!av_strcasecmp(value, "cdir") || !av_strcasecmp(value, "pdir"))
return 1;
if (!av_strcasecmp(value, "dir"))
next->type = AVIO_ENTRY_DIRECTORY;
else if (!av_strcasecmp(value, "file"))
next->type = AVIO_ENTRY_FILE;
else if (!av_strcasecmp(value, "OS.unix=slink:"))
next->type = AVIO_ENTRY_SYMBOLIC_LINK;
} else if (!av_strcasecmp(fact, "modify")) {
next->modification_timestamp = ftp_parse_date(value);
} else if (!av_strcasecmp(fact, "UNIX.mode")) {
next->filemode = strtoumax(value, NULL, 8);
} else if (!av_strcasecmp(fact, "UNIX.uid") || !av_strcasecmp(fact, "UNIX.owner"))
next->user_id = strtoumax(value, NULL, 10);
else if (!av_strcasecmp(fact, "UNIX.gid") || !av_strcasecmp(fact, "UNIX.group"))
next->group_id = strtoumax(value, NULL, 10);
else if (!av_strcasecmp(fact, "size") || !av_strcasecmp(fact, "sizd"))
next->size = strtoll(value, NULL, 10);
}
return 0;
}
/**
* @return 0 on success, negative on error, positive on entry to discard.
*/
static int ftp_parse_entry(URLContext *h, char *line, AVIODirEntry *next)
{
FTPContext *s = h->priv_data;
switch (s->listing_method) {
case MLSD:
return ftp_parse_entry_mlsd(line, next);
case NLST:
return ftp_parse_entry_nlst(line, next);
case UNKNOWN_METHOD:
default:
return -1;
}
}
static int ftp_read_dir(URLContext *h, AVIODirEntry **next)
{
FTPContext *s = h->priv_data;
char *start, *found;
int ret, retried;
do {
retried = 0;
start = s->dir_buffer + s->dir_buffer_offset;
while (!(found = strstr(start, "\n"))) {
if (retried)
return AVERROR(EIO);
s->dir_buffer_size -= s->dir_buffer_offset;
s->dir_buffer_offset = 0;
if (s->dir_buffer_size)
memmove(s->dir_buffer, start, s->dir_buffer_size);
ret = ffurl_read(s->conn_data, s->dir_buffer + s->dir_buffer_size, DIR_BUFFER_SIZE - (s->dir_buffer_size + 1));
if (ret < 0)
return ret;
if (!ret) {
*next = NULL;
return 0;
}
s->dir_buffer_size += ret;
s->dir_buffer[s->dir_buffer_size] = 0;
start = s->dir_buffer;
retried = 1;
}
s->dir_buffer_offset += (found + 1 - start);
found[0] = 0;
if (found > start && found[-1] == '\r')
found[-1] = 0;
*next = ff_alloc_dir_entry();
if (!*next)
return AVERROR(ENOMEM);
(*next)->utf8 = s->utf8;
ret = ftp_parse_entry(h, start, *next);
if (ret) {
avio_free_directory_entry(next);
if (ret < 0)
return ret;
}
} while (ret > 0);
return 0;
}
static int ftp_close_dir(URLContext *h)
{
FTPContext *s = h->priv_data;
av_freep(&s->dir_buffer);
ffurl_closep(&s->conn_control);
ffurl_closep(&s->conn_data);
return 0;
}
static int ftp_delete(URLContext *h)
{
FTPContext *s = h->priv_data;
char command[MAX_URL_SIZE];
static const int del_codes[] = {250, 421, 450, 500, 501, 502, 530, 550, 0};
static const int rmd_codes[] = {250, 421, 500, 501, 502, 530, 550, 0};
int ret;
if ((ret = ftp_connect(h, h->filename)) < 0)
goto cleanup;
ret = snprintf(command, sizeof(command), "DELE %s\r\n", s->path);
if (ret >= sizeof(command)) {
ret = AVERROR(ENOSYS);
goto cleanup;
}
if (ftp_send_command(s, command, del_codes, NULL) == 250) {
ret = 0;
goto cleanup;
}
ret = snprintf(command, sizeof(command), "RMD %s\r\n", s->path);
if (ret >= sizeof(command)) {
ret = AVERROR(ENOSYS);
goto cleanup;
}
if (ftp_send_command(s, command, rmd_codes, NULL) == 250)
ret = 0;
else
ret = AVERROR(EIO);
cleanup:
ftp_close(h);
return ret;
}
static int ftp_move(URLContext *h_src, URLContext *h_dst)
{
FTPContext *s = h_src->priv_data;
char command[MAX_URL_SIZE], path[MAX_URL_SIZE];
static const int rnfr_codes[] = {350, 421, 450, 500, 501, 502, 503, 530, 0};
static const int rnto_codes[] = {250, 421, 500, 501, 502, 503, 530, 532, 553, 0};
int ret;
if ((ret = ftp_connect(h_src, h_src->filename)) < 0)
goto cleanup;
ret = snprintf(command, sizeof(command), "RNFR %s\r\n", s->path);
if (ret >= sizeof(command)) {
ret = AVERROR(ENOSYS);
goto cleanup;
}
if (ftp_send_command(s, command, rnfr_codes, NULL) != 350) {
ret = AVERROR(EIO);
goto cleanup;
}
av_url_split(0, 0, 0, 0, 0, 0, 0,
path, sizeof(path),
h_dst->filename);
ret = snprintf(command, sizeof(command), "RNTO %s\r\n", path);
if (ret >= sizeof(command)) {
ret = AVERROR(ENOSYS);
goto cleanup;
}
if (ftp_send_command(s, command, rnto_codes, NULL) == 250)
ret = 0;
else
ret = AVERROR(EIO);
cleanup:
ftp_close(h_src);
return ret;
}
const URLProtocol ff_ftp_protocol = {
.name = "ftp",
.url_open = ftp_open,
.url_read = ftp_read,
.url_write = ftp_write,
.url_seek = ftp_seek,
.url_close = ftp_close,
.url_get_file_handle = ftp_get_file_handle,
.url_shutdown = ftp_shutdown,
.priv_data_size = sizeof(FTPContext),
.priv_data_class = &ftp_context_class,
.url_open_dir = ftp_open_dir,
.url_read_dir = ftp_read_dir,
.url_close_dir = ftp_close_dir,
.url_delete = ftp_delete,
.url_move = ftp_move,
.flags = URL_PROTOCOL_FLAG_NETWORK,
.default_whitelist = "tcp",
};